XENA is an innovative C2 made fully in Go. With hacking automation features.
☆392Apr 26, 2025Updated last year
Alternatives and similar repositories for XENA
Users that are interested in XENA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Red Team engagement platform with the goal of unifying offensive tools behind a simple UI☆304Feb 7, 2024Updated 2 years ago
- [WIP] A free and open-source, modular Remote Administration Tool (RAT) / Payload Dropper written in Go(lang) with a flexible command and …☆231Dec 3, 2023Updated 2 years ago
- C2 writen in Rust & Go powered by Tor network.☆157Oct 30, 2025Updated 6 months ago
- Nimbo-C2 is yet another (simple and lightweight) C2 framework☆445Jan 29, 2026Updated 3 months ago
- An open-source, centralized HTTPS botnet☆174Dec 10, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆29May 19, 2023Updated 3 years ago
- Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning☆14Dec 26, 2022Updated 3 years ago
- An open-source, centralized HTTPS botnet☆76Apr 11, 2023Updated 3 years ago
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,162Apr 17, 2025Updated last year
- Decentralised P2P botnet using toxcore.☆184Feb 8, 2026Updated 3 months ago
- A C2 post-exploitation framework☆488Jan 24, 2024Updated 2 years ago
- A modular C2 framework☆532May 8, 2026Updated last week
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Modules used by the Havoc Framework☆273Jun 17, 2024Updated last year
- Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.☆619Updated this week
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,759Jan 16, 2026Updated 4 months ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,112Apr 13, 2026Updated last month
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆224Nov 3, 2025Updated 6 months ago
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated last year
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,210Apr 16, 2025Updated last year
- A C# Command & Control framework☆1,028Mar 28, 2024Updated 2 years ago
- A tool for steganography of png files .☆24Jul 27, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An open-source, centralized HTTPS botnet☆45Apr 14, 2020Updated 6 years ago
- A command and control framework written in rust.☆389Apr 27, 2026Updated 3 weeks ago
- A cross platform C2/post-exploitation framework.☆710Oct 8, 2022Updated 3 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Dec 13, 2023Updated 2 years ago
- KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detecti…☆355Jul 15, 2023Updated 2 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆91Oct 10, 2022Updated 3 years ago
- Serving files with conditions, serverside keying and more.☆18May 26, 2022Updated 3 years ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆444Oct 1, 2025Updated 7 months ago
- EXOCET - AV-evading, undetectable, payload delivery tool☆842Aug 16, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆595Jun 12, 2024Updated last year
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 4 years ago
- Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still…☆629May 28, 2025Updated 11 months ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,505Dec 21, 2023Updated 2 years ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆389Jul 30, 2024Updated last year
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,172Sep 29, 2021Updated 4 years ago
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,468May 6, 2024Updated 2 years ago